Fixed bug #3139678: stack buffer overflow when parsing a double with a length of 32 characters.

This commit is contained in:
Baptiste Lepilleur
2011-05-01 15:47:38 +00:00
parent 9c98f2277b
commit 99043b32b5
2 changed files with 9 additions and 5 deletions

View File

@@ -610,7 +610,7 @@ Reader::decodeDouble( Token &token )
int length = int(token.end_ - token.start_);
if ( length <= bufferSize )
{
Char buffer[bufferSize];
Char buffer[bufferSize+1];
memcpy( buffer, token.start_, length );
buffer[length] = 0;
count = sscanf( buffer, "%lf", &value );